One of the first things you see when you log in to Cisco ISE is the dashboard containing the organization's Total Endpoints and Active Endpoints.
If your ISE dashboard has over 10X the number of active endpoints stored in the database, there is a GOOD CHANCE, you never configured ISE Endpoint Purge Rules. It is also very possible you can see adverse performance as a result of the extra devices. Profiling Activity, RADIUS Authentications (e.g. Any authorization rule that has conditions for matching profiled endpoints), and even context visibility is querying that large endpoint database.
Many organizations refresh laptops, workstations, phones, and devices every few years, without endpoint purge rules, ISE will never forget about those devices.
You can define the endpoint purge policy by configuring rules, based on identity groups and other conditions. In the Cisco ISE GUI, click the Menu icon and choose Administration > Identity Management > Settings > Endpoint Purge.
The default rules will take care of deleting guest and registered devices that are older than 30 days. The purge job runs at 3:00 a.m. every day based on the time zone configured in the primary PAN. The endpoint purge schedule is enabled by default.
Unless you are in Higher Education (College or University), where students are gone with their devices for X days of summer, anything that hasn't connected to wired, wireless, or VPN networks in over 90 days is most likely not coming back. Either way, endpoint purge rules allow an organization to determine when to ""age out"" inactive devices.
To configure an endpoint purge rule that will delete endpoints that haven't been active in over 90 days:
Note: If a device gets purged and then returns to the network, ISE will add it back and perform AAA, Profiling, etc., just like the first time the device connected.
From the ISE 3.1 Admin Guide:
You can schedule an endpoint purge job.
Endpoint purge deletes over five thousand endpoints every 3 minutes.
Along with checking for endpoint purge settings, ModernCyber's Health Check Assessment of the Cisco Identity Services Engine (ISE) deployed within the Customer’s I.T. organization can help give you an independent review of your deployment. The health check service in short provides a comprehensive review of the Cisco ISE deployment configuration & architecture's overall health, stability, and scalability. The intent is to identify areas for improvement or possible challenges, which may currently exist or arise in the future and document the areas that could potentially be improved upon and gaps that need to be addressed. Ideally, the results of the health check provide data points and tasks that aid in the development of a road map to strengthen, optimize, and/or remediate the Cisco ISE deployment within the customer's Enterprise Network.
Schedule some time to speak with one of our ISE experts.